General

  • Target

    ZXRTBNUOO1.js

  • Size

    9KB

  • Sample

    211206-vgavlshef3

  • MD5

    46d001587dd33056afb6dd4f8ace0310

  • SHA1

    6f7b364e422b91bfdc5321fcff95438223da153c

  • SHA256

    e913fbfe0af0074695ba3d6d8306f5ab24699df20c0fd2309dc3c3aa80d3271c

  • SHA512

    8ce90351d129bb7c999afd8f4ee48f6fed4e710921b9d2597206939b52d335cc97ffb13e859eca5b0721cacd1fce60b2e90392616ea64b43cb430451c318def3

Malware Config

Extracted

Family

vjw0rm

C2

http://marshjohn989.duckdns.org:7920

Targets

    • Target

      ZXRTBNUOO1.js

    • Size

      9KB

    • MD5

      46d001587dd33056afb6dd4f8ace0310

    • SHA1

      6f7b364e422b91bfdc5321fcff95438223da153c

    • SHA256

      e913fbfe0af0074695ba3d6d8306f5ab24699df20c0fd2309dc3c3aa80d3271c

    • SHA512

      8ce90351d129bb7c999afd8f4ee48f6fed4e710921b9d2597206939b52d335cc97ffb13e859eca5b0721cacd1fce60b2e90392616ea64b43cb430451c318def3

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks